Results 41 to 50 of about 171,486 (208)
XOR-Based (n, n) Visual Cryptography Schemes for Grayscale or Color Images with Meaningful Shares
XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares.
Yu-Hong Chen, Justie Su-Tzu Juan
doaj +1 more source
The secreted secret of PCSK9 [PDF]
Amgen researchers have demonstrated that blocking secreted PCSK9 in mice and nonhuman primates lowers LDL cholesterol. The findings bolster the case for an antibody-based approach to blocking the protein, which is a genetically validated target for hypercholesterolemia.
openaire +1 more source
Dynamic Multi-secret Sharing Scheme in Vector Space Without Trusted Center [PDF]
The existing secret sharing scheme in the vector space cannot achieve the secret share update or the dynamic addition and deletion of members,and it is hard to ensure the existence of trusted center,so a multi-secret sharing scheme without trusted center
WANG Yuli,DU Weizhang
doaj +1 more source
A Novel Secret Sharing Method Based on Binary Sequence
A novel secret sharing method was proposed based on binary sequence,which was quite different from the traditional secret sharing method.This secret sharing method was based on binary secret sequence using bit operations.The secret here included but not ...
Yexia Cheng +5 more
doaj +2 more sources
Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images
In today's era of developed network, it is particularly important to ensure the security of information. Secret image sharing is a kind of secret information protection technology with loss tolerance by sharing a secret image to a number of shadow images.
Qinghong Gong +3 more
doaj +1 more source
Design models of secret reconstruction towards rational users
Rational Secret Reconstruction is an intersection between traditional secret reconstruction and game theory, which aims to restrict the selfish behaviors of rational users, making both of them obtain the secret in real applications.However, when directly
Hai LIU +4 more
doaj +2 more sources
An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj +1 more source
Key distribution and recovery algorithm based on Shamir's secret sharing
In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about ...
Hui-gui RONG +4 more
doaj +2 more sources
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the additional property that the secret can be recovered, with probability at least , from the set of all shares even if up to t players provide incorrect ...
Jhanwar Mahabir P. +1 more
doaj +1 more source
Little-known facts about food allergens, allergies, and labeling. Virtual Mentor is a monthly bioethics journal published by the American Medical Association.
openaire +2 more sources

